Investigating vulnerability CVEs for PhotonOS-based appliances
search cancel

Investigating vulnerability CVEs for PhotonOS-based appliances

book

Article ID: 325921

calendar_today

Updated On:

Products

VMware Aria Suite

Issue/Introduction

This KB serves as a guide to identify validity of reported vulnerabilities/CVEs in PhotonOS-based VMware applications from a security scan.
  • You have recently scanned the application using a vulnerability scanner and identified CVE(s) that are impacting the system.
  • You have checked the VMware product release notes, VMSAs, and have reviewed existing Knowledge Articles for the CVE in question and cannot ascertain its fixed state.

Environment

All PhotonOS-based VMware applications

Resolution

Validate RPM packages and PhotonOS versions

Prerequisites:

  • You have SSH access with root username and password for the VMware application.

Procedure

  1. Document the VMware application version by using the About or Help functions in the product UI.
  2. Verify the PhotonOS version in an environment by running the following command:
    cat etc/photon-release
  3. Gather the audit data on how the scanner is looking for this vulnerability. This is often a simple rpm version check for PhotonOS based appliances.
  4. Verify the rpm packages installed on the system:
    rpm -qa | grep packagename
  5. Compare this information from the appliance against the vulnerable version in the CVE and scan data.
    1. As long as the package is on the version that the CVE has been fixed in or higher, or it doesn't show up, this verifies that the CVE has been fixed and can be safely ignored.
      1. Take this information to your scanning team and request they have a case opened with the necessary vulnerability scanner support team.
    2. If you are unsure of the validity of the information you have collected, open a support case with VMware by Broadcom for additional guidance.
      1. Ensure you include the following:
        1. Scan data
          1. Vendor of vulnerability scanner
          2. Details of the checks being performed against the system
        2. Versions of VMware products
        3. PhotonOS version
        4. rpm -qa output.